featured post
Kwampirs Malware targeting Global Industries

Kwampirs Malware targeting Global Industries Including the Healthcare Sector, Supply Chain, Financial Institutions, and prominent Law firms. The Federal Bureau of Investigation (FBI) has sent a security alert to the U.S. private sector about an ongoing attack against the healthcare sector, supply chain software vendors, financial institutions and prominent law […]

read more
Blog, Featured | by Andrew Von Ramin Mapp

Addressing Employee Data Theft in your Organization

Addressing Employee Data Theft in your Organization Almost a decade ago, Jason Needham left his job at an engineering firm to start his own company. After resigning, through virtual backdoors and unauthorized accounts, Jason was able to continue accessing his former employee’s data and systems. Over two years after leaving […]

read more
Blog, Featured | by Andrew Von Ramin Mapp

When a file acts as a double agent and how to address it

When a file acts as a double agent and how to address it Incident response is a critical security and business function required to keep the integrity of any company in check. How a company reacts when the pressure is on could potentially make or break the financial fallout of […]

read more
Blog | by Bridget

Future of Automation in Digital Forensics

Techno Security & Digital Forensics Conference 2018 program featured 67 sessions led by 64 industry experts organized under the primary tracks of Audit/Risk Management, Forensics, Investigations, Information Security, and Sponsor Demos. Session topics included Password Cracking, Digital Evidence from Social Networking, Apple File Systems, Dark Web Investigations, Windows PowerShell, Drone […]

read more
Blog | by Bridget

Password Spraying – Explained

Password spraying is an attack that attempts to access a large number of accounts with a few commonly used passwords while brute-force attacks attempt to gain unauthorized access to a single account by guessing the password. In this video Cyber Centaurs show how password spraying works.

read more
Blog | by Bridget

2020 Cybersecurity Forecast

Despite a considerable strengthening of cyber defenses undertaken in the recent past, vulnerabilities do exist and need to be promptly addressed, especially those of legacy IT systems and access control loopholes. 2020 Cybersecurity Predictions Cybersecurity predictions include the upcoming elections in the USA, more targeted ransomware,, new attack vectors, more […]

read more
Blog | by Bridget

What is eDiscovery?

Electronic discovery (sometimes known as e-discovery, ediscovery, eDiscovery, or e-Discovery) is the electronic aspect of identifying, collecting and producing electronically stored information (ESI) in response to a request for production in a law suit or investigation. ESI includes, but is not limited to, emails, documents, presentations, databases, voicemail, audio and […]

read more
Blog | by Bridget

Former Yahoo Employee Pledged Guilty for Hacking into Nearly 6000 Accounts

Reyes Daniel Ruiz plead guilty in federal court in San Jose, CA to hacking into the accounts of nearly six thousands of Yahoo user’s in search of private and personal records, primarily looking for sexual images and videos of the account holders, announced United States Attorney David L. Anderson and […]

read more
Blog | by Bridget

Unpatchable Vulnerability “Checkm8” is a Game-Changer for Jailbreak Community

Last week we have seen the release of Checkm8. Unlike just about every other jailbreak exploit released in the past nine years, it targets the iOS boot-ROM, which contains the very first code that’s executed when a device is turned on. Because the boot-ROM is contained in read-only memory inside […]

read more
Blog | by Cyber Centaurs

Insights Every Technology Leader Should Gain from the Atlanta Ransomware Disaster

As most of you are aware, on March 22nd, 2018, the city of Atlanta was hit by the dreaded SamSam ransomware. The city’s services had ground to a halt. Residents could not pay for essential services, like water and the city was not able to collect revenue from parking fines. Police […]

read more

Addressing Employee Data Theft in your Organization

Addressing Employee Data Theft in your Organization Almost a decade ago, Jason Needham left his job at an engineering firm to start his own company. After resigning, through virtual backdoors and unauthorized accounts, Jason was able to continue accessing his former employee’s data and systems. Over two years after leaving […]

read more

When a file acts as a double agent and how to address it

When a file acts as a double agent and how to address it Incident response is a critical security and business function required to keep the integrity of any company in check. How a company reacts when the pressure is on could potentially make or break the financial fallout of […]

read more